BATTLEFIELD OF THE FUTURE
Battlefield of the Future - Air University Press
Battlefield of the Future - Air University Press
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>BATTLEFIELD</strong> <strong>OF</strong> <strong>THE</strong> <strong>FUTURE</strong><br />
warfare between two belligerent nations . During the recent<br />
border dispute between Ecuador and Peru, Ecuador used the<br />
Internet to publish government bulletins and excerpts from<br />
local media to tell its side of the conflict . In retaliation, Peru<br />
Internet used a gopher site in an attempt to neutralize<br />
Ecuadorian propaganda . [A gopher is an information system<br />
residing on the Internet that knows where everything is and,<br />
through an arrangement of nested menus, allows a user to<br />
continue choosing menu items until the sought-after subject<br />
is located . 79] The resulting verbal skirmish left both nations<br />
working to set up their own gophers .8°<br />
Global information systems will enable ordinary users to<br />
access an extraordinary number of databases, far beyond the<br />
Internet capability of today (which is more than a million files at<br />
databases located at universities and corporate research<br />
centers) . New software technologies permit these accesses to be<br />
conducted autonomously, using "self-navigating data drones ."<br />
These drones, referred to as "knowbots," are released into the<br />
Internet and search for information on their own . They can roam<br />
from network to network, clone themselves, transmit data back<br />
to their origin, and communicate with other knowbots .8 l Given<br />
this capability, one has to wonder, and perhaps be concerned,<br />
about the potential for unauthorized, or at least undesirable,<br />
access to certain databases and computer activities .<br />
Hackers routinely attempt to get into US military systems .<br />
During the Gulf War, hackers from Denmark, Moscow, and Iraq<br />
tried to penetrate these systems .82 Our awareness of these<br />
attempts does not necessarily prove there were no successes of<br />
which we are unaware . And, even if they failed during that<br />
conflict, can we guarantee the security of our systems during the<br />
next war?<br />
These vulnerabilities were revealed recently when a British<br />
teenager using a personal computer at his home hacked his way<br />
into a US military computer network, gained access to files<br />
containing sensitive communications relating to the dispute<br />
with North Korea over international inspections of its nuclear<br />
program, and, after reading them, placed them on the Internet.<br />
His actions made those files available to about 35 million<br />
people . Officials suspect he had access to these computers for<br />
weeks, perhaps even months, before he was caught .<br />
192